The DECT standard is contained within ETS 300 175 and defines the DECT system fromt he physical layer of the radio interface to the networking, addressing and security.

The DECT cordless phone system has gain widespread acceptance. Many millions of DECT phones are in use around the world, its use spreading well beyond the boundaries of Europe where it was originally envisaged it would be used, and it is used in well over 100 countries around the globe.

The standard for DECT or Digital Enhanced Telecommunications system was developed by members of the European Telecommunications Standards Institute (ETSI).

The fact that DECT has an agreed standard has been a major element in its success. This has enabled it to be used across a large number of manufacturers, and it enables phones from one manufacturer to operate with equipment from another.

DECT standard

The DECT standard is contained in ETS 300 175 of which there are eight parts, each defining different aspects of the system. The DECT standard, ETS 300 175 consists of a comprehensive set of requirements, protocols and messages. By defining the standard very closely it is possible to achieve interworking reliably not only between handsets and base stations, but also to the telecommuications network itself.

The major sections of the DECT stadanrd ETS 300 175 are defined in the table below:

Part

Title

Description

1

Overview

General introduction and overiew to the document detailing the other parts of ETS 300 175 DECT standard.

The MAC section of the DECT standard details the description of procedures, messages, and protocols for radio resource management. These include the link set-up, channel selection, handover, link release and link quality maintenance.

4

Data Link Control Layer

This section provides description of provisions to secure a reliable data link to the network layer.

5

Network Layer

This details the signalling layer with call control and mobility management functions and protocols.

6

Identities and Addressing

Description of the portable and fixed part identities requirements for all DECT application environments.

7

Security Aspects

The security is important and it details the methods of ensuring security to prevent eavesdropping, unauthorised access, hacking and fraudulent use.

The DECT cordless phone system is now a well established standard that is widely used for domestic as well as business applications. With the extensions that are now available to the standard, it has become a very flexible system, and this is much of the reason for the success of the DECT cordless phone system.